Computer Information System Construction Based on Information System Security Level and Structure Model
نویسندگان
چکیده
Objective: with the development of information technology, computer information system has become the lifeblood of the national institutions and the pillar of the social activities, so the information security is particularly important. Methods: in this paper, according to the level and structure of information security model, it is proposed based on the host, network, facilities, and methods such as the security policy of security events. Process: design a system of information system security model and empirically validate the practicability of this model. Analysis: use the method of risk analysis technology forms and advantages of system security threat. Conclusion: building a set of perfect security system for information system from the system angle. To detect the story boundary (SB) of Xinwenlianbo precisely, this paper proposes a method of three-level criterion story segmentation (SS) based on content analysis. For the story with anchorperson, this paper uses penny distance to judge whether the anchorperson gotten by video feature is true or not to look for SB; for the story without anchorperson, this paper looks for the SB by judging the shot change point occurs in the silence region.
منابع مشابه
New Realities of the Enterprise Management System Information Support: Economic and Mathematical Models and Cloud Technologies
The paper focuses on the urgency of the implementation of cloud technologies, which are a necessary condition for the development of enterprise management systems, give rise to a complex of insufficiently studied phenomena and processes and determine the need to find new tools in making and implementing reasonable management decisions. In the process of research, the sequence of construction an...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملA New Method for Intrusion Detection Using Genetic Algorithm and Neural network
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...
متن کاملعوامل موثر بر پذیرش فناوری اطلاعات در محیط بالینی از دیدگاه پرستاران
Background and Aim: Information technology acceptance model predicts acceptance based on end-users' perceived usefulness and ease of use of technology for a specific purpose. The aim of this study is to understand nursing staff’s adoption of clinical information systems based on information technology acceptance model. Materials and Methods: This descriptive- analytic study was conducted on 3...
متن کاملامنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور
Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...
متن کاملContext-Aware Recommender Systems: A Review of the Structure Research
Recommender systems are a branch of retrieval systems and information matching, which through identifying the interests and requires of the user, help the users achieve the desired information or service through a massive selection of choices. In recent years, the recommender systems apply describing information in the terms of the user, such as location, time, and task, in order to produce re...
متن کامل